Difference between revisions of "WAF 390907"

From Atomicorp Wiki
Jump to: navigation, search
(Created page with "{{Infobox |header1= Rule 390907 |label2 = Status |data2 = Active |label3 = Alert Message |data3 = Atomicorp.com WAF Rules: Possible Shell Command Attempt }} = Description = ...")
 

Latest revision as of 09:33, 22 January 2013

Rule 390907
Status Active
Alert Message Atomicorp.com WAF Rules: Possible Shell Command Attempt

Contents

[edit] Description

This rules detects when shell commands and raw code are injected into a request.


[edit] Troubleshooting

[edit] False Positives

This rule may produce a false positive if an application allows the use of shell commands or raw code in a safe and secure manner. The rules contain a large library of known trusted methods, however it is possible an application may be using a previously untested method. It is not recommended that you disable this rule if you have a false positive. If you believe this is a false positive, please report this to our security team to determine if this is a legitimate case, or if its clever attack on your system. Instructions to report false positives are detailed on the Reporting False Positives wiki page. If it is a false positive, we will fix the issue in the rules and get a release out to you promptly.

[edit] Tuning Guidance

See the Mod_security page for guidance on tuning this rule.

[edit] Additional Information

[edit] Similar Rules

None.

[edit] Knowledge Base Articles

None.

[edit] Outside References

None.

[edit] Notes

None.

Personal tools